CS 107Fall Semester 2004Section 51Lecture Week 11Computer Security |
UNH Home Page | Computer Science Department Home Page | Contact Instructor |
Course Home PageSyllabusAssignmentsLectures |
|
Covers: Computer Confluence - Chapter 10
How do viruses and worms spread in e-mail? - http://computer.howstuffworks.com/question339.htm
Fighting Computer Viruses - http://vx.netlux.org/lib/ajk01.html
Symantec Virus database - http://www.symantec.com/avcenter/vinfodb.html
Computer Virus Index - http://www.faqs.org/faqs/computer-virus/
F-Secure Security Information Center - http://www.f-secure.com/virus-info/
Computer Crime Researh Center - http://www.crime-research.org/
How the FBI Investigates Computer Crime - http://www.cert.org/tech_tips/FBI_investigates_crime.html
FEDERAL BUREAU OF INVESTIGATION NATIONAL COMPUTER CRIME SQUAD - http://www.emergency.com/fbi-nccs.htm
Computer Crime Directory - http://www.officer.com/c_crimes.htm
Computer Crime Laws by State - http://nsi.org/Library/Compsec/computerlaw/statelaws.html
US-CERT - http://www.us-cert.gov/
Tips for Avoiding Computer Crime - http://www.rbs2.com/cvict.htm
Home PC Firewall Guide - http://www.firewallguide.com/
How to Become a Hacker - http://www.catb.org/~esr/faqs/hacker-howto.html
The Hacker FAQ - http://www.plethora.net/~seebs/faqs/hacker.html
HOW TO CHOOSE A ÊBADÊ PASSWORD! - http://noether.vassar.edu/~myers/help/Passwords.html
Spam Laws: United States: Federal Laws: Computer Owners' Bill of Rights - http://www.spamlaws.com/federal/108s563.html
Americans for Computer Privacy - http://www.computerprivacy.org/
Homeland Security: An Assault of Privacy? - http://news.zdnet.com/2100-1009_22-5419084.html
Last Updated: 11/15/04 |